Clearview AIÒò²»·¨ÍøÂçÊý¾Ý±»·¨¹ú·£¿£¿î2000ÍòÅ·Ôª
Ðû²¼Ê±¼ä 2022-10-24
10ÔÂ21ÈÕ±¨µÀ£¬£¬£¬£¬£¬·¨¹úÊý¾Ý±£»£»¤»ú¹¹(CNIL)Òò²»·¨ÍøÂçºÍ´¦Öóͷ£·¨¹ú¹«ÃñµÄÉúÎïÌØÕ÷Êý¾Ý¶ø¶ÔClearview AI´¦ÒÔ2000ÍòÅ·ÔªµÄ·£¿£¿î¡£¡£¡£CNIL»¹ÏÂÁîÕâ¼Ò¹«Ë¾×èÖ¹ËùÓеÄÊý¾ÝÍøÂç»î¶¯£¬£¬£¬£¬£¬²¢ÔÚÁ½¸öÔÂÄÚɾ³ýÒÑ¾ÍøÂçµÄËùÓÐÊý¾Ý¡£¡£¡£ÈôÊÇClearview AIÔÚÁ½¸öÔºóδÄÜ×ñÊØÏÂÁ£¬£¬£¬£¬CNIL½«¶Ô¸Ã¹«Ë¾´¦ÒÔÌìÌì100000Å·ÔªµÄ·£¿£¿î¡£¡£¡£CNILͨ¸æÖгƣ¬£¬£¬£¬£¬¸Ã»ú¹¹ÔÚ2021Äê5ÔÂÔø¾ÍÎ¥¹æÐÐΪÏòClearview AI·¢³öÁËÖÒÑÔ£¬£¬£¬£¬£¬²¢ÔÚ2021Äê12Ô·¢³öÁË×îºóÖÒÑÔ£¬£¬£¬£¬£¬µ«ºóÕßδ×ñÊØÏÂÁî¡£¡£¡£
https://www.bleepingcomputer.com/news/security/clearview-ai-gets-third-20-million-fine-for-illegal-data-collection/
2¡¢Black RewardÍÅ»ïÉù³ÆÒÑÇÔÈ¡ÒÁÀÊÔ×ÓÄÜ»ú¹¹µÄÊý¾Ý
¾Ý10ÔÂ23ÈÕ±¨µÀ£¬£¬£¬£¬£¬×Ô³ÆÎªBlack RewardµÄºÚ¿ÍÍÅ»ïÔÚTelegramÉÏÉù³Æ¹¥»÷ÁËÒÁÀÊÔ×ÓÄÜ×éÖ¯£¬£¬£¬£¬£¬±ðµÄ£¬£¬£¬£¬£¬ËûÃÇ»¹Ðû²¼ÁËÓйز¼Ê²¶û¹¤³§µÄÌõÔ¼¡¢½¨ÉèÍýÏëºÍ×°±¸Ï¸½ÚµÄÏà¹ØÎļþ£¬£¬£¬£¬£¬×÷ΪÈëÇÖµÄÖ¤¾Ý¡£¡£¡£¸Ã×éÖ¯³ÆÒÑÇÔÈ¡50 GBµÄÎļþ£¬£¬£¬£¬£¬ÏÖÔÚÉв»ÇåÎúÕâЩÊý¾ÝÖÐÊÇ·ñ»¹°üÀ¨ÉñÃØÐÅÏ¢¡£¡£¡£ÒÁÀÊÔ×ÓÄÜ»ú¹¹ÔÚÉÏÖÜÈÕ͸¶£¬£¬£¬£¬£¬¹¥»÷ÕßÈëÇÖÁËÒ»¼ÒÔÚ²¼Ê²¶ûÔËÓª¸Ã¹úΨһºËµçÕ¾µÄ¹«Ë¾ËùʹÓõĵç×ÓÓʼþϵͳ£¬£¬£¬£¬£¬²¢½«¹¥»÷¹é×ïÓÚ¡°Íâ¹ú¡±£¬£¬£¬£¬£¬µ«Ã»ÓÐÏêϸ˵Ã÷¡£¡£¡£
https://securityaffairs.co/wordpress/137513/hacking/hackers-stole-sensitive-data-from-irans-atomic-energy-agency.html
3¡¢ÃÀ¹úÒ½ÁÆ»ú¹¹AAH͸¶Լ300Íò»¼ÕßµÄСÎÒ˽¼ÒÐÅϢй¶
ýÌå10ÔÂ20ÈÕ±¨µÀ£¬£¬£¬£¬£¬ÔÚÍþ˹¿µÐÇÖݺÍÒÁÀûŵÒÁÖÝÓµÓÐ26¼ÒÒ½ÔºµÄAdvocate Aurora Health(AAH)ÕýÔÚÏòÆä»¼Õß·¢Ë͹ØÓÚ½üÆÚÊý¾Ýй¶ÊÂÎñµÄ֪ͨ¡£¡£¡£¸ÃÊÂÎñÊÇÓÉÓÚÔÚAAHÍøÕ¾É϶ÔMeta PixelµÄʹÓò»µ±Ôì³ÉµÄ£¬£¬£¬£¬£¬¿ÉÄÜй¶»¼ÕßµÄСÎÒ˽¼ÒºÍÒ½ÁÆÐÅÏ¢¡£¡£¡£AAHÏòÃÀ¹úÎÀÉú²¿µÄ±¨¸æ³Æ£¬£¬£¬£¬£¬¸ÃÊÂÎñÓ°ÏìÁËÔ¼300ÍòÈË¡£¡£¡£ÃÀ¹úÐí¶àÒ½Ôº¶¼Ê¹ÓÃMeta Pixel£¬£¬£¬£¬£¬Òò´ËÕâÒ»Òþ˽й¶ÎÊÌâÔڸùúÏÆÆðÁËÒ»³¡·ç²¨£¬£¬£¬£¬£¬µ¼ÖÂÊý°ÙÍòÈËÐÅϢ̻¶¸øµÚÈý·½£¬£¬£¬£¬£¬²¢Òý·¢Á˶ÔÔðÈλú¹¹µÄÕûÌåËßËÏ¡£¡£¡£
https://www.securityweek.com/data-3-million-advocate-aurora-health-patients-exposed-malformed-pixel
4¡¢Google PlayÖеÄ16¸ö¶ñÒâÓ¦ÓÃÒѱ»ÏÂÔØÁè¼Ý2000Íò´Î
McAfeeÓÚ10ÔÂ19ÈÕÅû¶ÁËGoogle PlayÉÏ16¸öѬȾÁËClicker¶ñÒâÈí¼þµÄÓ¦Ó㬣¬£¬£¬£¬×Ü×°ÖÃÁ¿¸ß´ï2000Íò´Î¡£¡£¡£ClickerÊÇÒ»ÖÖÌØÊâµÄ¹ã¸æÈí¼þ£¬£¬£¬£¬£¬ËüÔÚ²»¿É¼ûµÄ¿ò¼Ü»òÅä¾°ÖмÓÔØ¹ã¸æ²¢µã»÷ËüÃÇΪÆäÔËÓªÍŻﴴÊÕ¡£¡£¡£¶Ô×°±¸µÄÓ°Ïì¿ÉÄÜÊǵ¼ÖÂÐÔÄÜϽµ¡¢¹ýÈÈ¡¢µç³ØÊ¹ÓÃÁ¿ÔöÌíÒÔ¼°Òƶ¯Êý¾ÝÊշѹý¸ß¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬ÕâЩ¶ñÒâÓ¦ÓÃÒѱ»É¾³ý£¬£¬£¬£¬£¬ÆäÖÐDxCleanÔÚ±»É¾³ý֮ǰÒÑ×°ÖÃÁË500Íò´Î¡£¡£¡£
https://www.mcafee.com/blogs/other-blogs/mcafee-labs/new-malicious-clicker-found-in-apps-installed-by-20m-users/
5¡¢CISAµÈ»ú¹¹ÁªºÏÐû²¼¹ØÓÚDaixin TeamµÄÇå¾²×Éѯ
10ÔÂ21ÈÕ£¬£¬£¬£¬£¬CISA¡¢FBIºÍHHSÁªºÏÐû²¼Á˹ØÓÚDaixin TeamµÄÇå¾²×Éѯ¡£¡£¡£¸ÃÍÅ»ï×Ô2022Äê6ÔÂ×îÏȾÍÕë¶ÔÃÀ¹úÒ½ÁƱ£½¡ºÍ¹«¹²ÎÀÉú(HPH)²¿·Ö£¬£¬£¬£¬£¬¶ÔÓÃÓÚÒ½ÁÆÐ§À͵Äϵͳ¾ÙÐмÓÃÜ£¬£¬£¬£¬£¬²¢ÇÔÈ¡»¼ÕߵĿµ½¡ÐÅÏ¢(PHI)ºÍСÎÒ˽¼ÒÉí·ÝÐÅÏ¢(PII)¡£¡£¡£¹¥»÷Õßͨ¹ýʹÓÃ×éÖ¯VPNЧÀÍÆ÷ÖеÄÎó²î£¬£¬£¬£¬£¬»òʹÓÃÏÈǰ±»ÆÆËðµÄƾ֤»á¼ûδÆôÓÃMFAµÄµÄ¾É°æVPNЧÀÍÆ÷£¬£¬£¬£¬£¬À´»ñµÃ¶ÔÄ¿µÄÍøÂçµÄ»á¼ûȨÏÞ¡£¡£¡£Ò»µ©Àֳɣ¬£¬£¬£¬£¬ËûÃǾͻáʹÓÃRDPºÍSSHÔÚÄ¿µÄÍøÂçÖкáÏòÒÆ¶¯¡£¡£¡£¸Ã×Éѯ»¹¹ûÕæÁËIOCºÍTTP£¬£¬£¬£¬£¬ÒÔ×ÊÖúÇå¾²Ö°Ô±¼ì²âºÍ×èÖ¹´ËÀ๥»÷¡£¡£¡£
https://www.cisa.gov/uscert/ncas/current-activity/2022/10/21/stopransomware-daixin-team
6¡¢MandiantÐû²¼¹ØÓÚURSNIFбäÌåµÄÊÖÒÕÆÊÎö±¨¸æ
10ÔÂ19ÈÕ£¬£¬£¬£¬£¬MandiantÐû²¼Á˹ØÓÚ¶ñÒâÈí¼þURSNIFбäÌåµÄÊÖÒÕÆÊÎö±¨¸æ¡£¡£¡£Ð±äÌåÔÚ6ÔÂÊ״α»·¢Ã÷£¬£¬£¬£¬£¬Óë֮ǰµÄµü´ú°æ±¾²î±ð£¬£¬£¬£¬£¬Õâ¸ö±»³ÆÎªLDR4µÄбäÌå²»ÊÇÒøÐÐľÂí£¬£¬£¬£¬£¬¶øÊÇÒ»¸öͨË׵ĺóÃÅ£¨ÀàËÆÓÚSAIGON±äÌ壩¡£¡£¡£ÓëLDR4Ïà¹ØµÄ¹¥»÷Á´Ê¼ÓÚÕÐÆ¸Ïà¹ØµÄÀ¬»øÓʼþ»î¶¯£¬£¬£¬£¬£¬Óʼþ°üÀ¨Ö¸Ïò±»Ñ¬È¾ÍøÕ¾µÄÁ´½Ó£¬£¬£¬£¬£¬Á´½ÓÖØ¶¨Ïòµ½Î±×°³ÉÕýµ±¹«Ë¾µÄÓò¡£¡£¡£»£»áÏÂÔØ°üÀ¨ÓëÓʼþÓÕ¶üÏà¹ØµÄExcelÎĵµ£¬£¬£¬£¬£¬·¿ªºó½«ÏÂÔØ²¢Ö´ÐÐLDR4 payload¡£¡£¡£¶Ô×îбäÌå´úÂëµÄÆÊÎöÅú×¢£¬£¬£¬£¬£¬¿ª·¢Ö°Ô±ÒѾÍêȫɾ³ýÁËÒøÐÐÏà¹Ø¹¦Ð§¡£¡£¡£
https://www.mandiant.com/resources/blog/rm3-ldr4-ursnif-banking-fraud


¾©¹«Íø°²±¸11010802024551ºÅ